1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lakkis [162]
3 years ago
15

Which of the following is necessary for opening email attachments under most circumstances? The correct RAM The correct drivers

The correct software The correct certificates
Computers and Technology
1 answer:
svet-max [94.6K]3 years ago
4 0

Answer:

The Correct Software

Explanation:

Some mail application have built in support to view the attachment like in a phone. While others don't, so if that is the case your device will attempt to open the file according to its extension (.exe, .txt, .js etc.) If your device doesn't have the correct software to open it, then the other things don't matter.

You might be interested in
What is a googleplex?
kherson [118]
The name given to the large number 10 to the power of 10100
4 0
2 years ago
Numerical methods are implementations of mathematical algorithms, but constructed with special consideration for accuracy of sol
Mandarinka [93]

Answer:

find detailed description of algorithms (direct and iterative methods) in books [8], [3], [24]. We limit ourself to only selected problems and methods which are important in chemical engineering. 1.2.1 Conditioning of a system of linear equations We do not compute accurately because of rounding errors, which affect results of calcu-lations.

Explanation:

8 0
2 years ago
Isaac is researching Abraham Lincoln’s life for a social studies report. He finds an encyclopedia that includes original letters
cestrela7 [59]
The answer is D) Tertiary because encyclopedias use both primary and secondary sources. 
7 0
3 years ago
Read 2 more answers
The process of combining rows and columns in a table is called _____.
Oksi-84 [34.3K]
The Answer of the given question : D. Merging
8 0
3 years ago
You open a folder Properties box to encrypt the folder, click Advanced, and discover that Encrypt contents to secure data is dim
yaroslaw [1]

Most likely a virus has attacked the system and is disabling encryption is the most likely problem.

c. Most likely a virus has attacked the system and is disabling encryption.

<u>Explanation:</u>

The end users can protect the folder by enabling encrypt the folder or files. But in windows encrypting the file or folder is not available. The computer management console is used to open all other services such as risk management, performance management extra.

In some other operating encryption of folder or files is allowed.  Third-party software is available to protect folder or files once the third party used any files possible to share outside the world.

As far as my knowledge there is encrypting technology is available in the windows operating system.

5 0
2 years ago
Other questions:
  • "Which of the following will help protect against a brute force attack?
    11·1 answer
  • The ___ is the primary storage device of a personal computer. hard drive RAM ROM compact disc
    6·1 answer
  • How to use javascript libraries in javascript code?
    9·1 answer
  • Anna is making a presentation on the solar system. She wants to emphasize the planet names as they appear one by one on the pres
    11·1 answer
  • Controlling the physical world with sensors and digital devices depends on bandwidth and the ability to analyze data in real tim
    5·1 answer
  • The counter in a for or while loop can have an explicit increment: for i=m:k:n. This advances the counter i by increment k each
    15·1 answer
  • Where is a 3D modeler most likely to work?
    6·1 answer
  • Which is NOT a benefit of using visual aids?
    9·2 answers
  • Complete the second clause of the following Prolog program for member/2 where member(X, Y) checks whether X is an element (a mem
    7·1 answer
  • if we intend to include a servo motor as an actuator, what feature should we include when selecting a microcontroller?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!